Sunteți pe pagina 1din 4

Volume 4, Issue 12, December – 2019 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Towards the Development of a Real-time


Deep Surveillance Industrial Scene Human
Activity Recognition System to Mitigate
Gas Pipe-lines Vandalization
Onuh Gabriel Akan J. Bello
Department of Computer Engineering, Department of Computer Engineering
Ahmadu Bello University, Zaria, Nigeria Ahmadu Bello University, Zaria, Nigeria

Abstract:- Human activity detection and recognition I. INTRODUCTION


(HADR) is an important field of study in computer
vision, due to it wide application areas like security Gas and oil pipeline vandalization in Nigerian has
surveillance, robotics, human computer interaction, significantly affected the oil sector and the country at large
content based retrieval and annotation, human fall in numerous ways which includes huge economic losses
detection etc.,. The essence of HADR is to automatically from pipeline & plant shutdown, pollution of environment,
understand and recognized what kind of action (human by oil spillage, fire outbreaks usually resulting in loss of
behavior and activities) is performed by human in a lives amongst others. Thus, shortage and scarcity, of
video captured by a surveillance system. This is really a petroleum products as well as decrease in electricity-
difficult problem due to many challenges involved in supply, with the attendant socio-economic problems can
HADR. These challenges include: cluttered also be attributed to pipeline vandalism [10]. Petroleum
backgrounds, variation in motion and human shape, products in Nigeria, are mostly transported via a network of
variation in illumination conditions, occlusion, and pipeline running across various part of the country through
viewpoint variations. However, the intensity of these remote area to populated areas however, these pipelines are
challenges may vary depending on the category of an poorly secured thereby attracting various forms of
activity under consideration. Generally, the activities repetitive attacks targets by vandals. Countless measure
are grouped into four classes which constituent, human- have been taken by government to ensure efficient service
gestures, actions, interactions, and group activities, this delivery but the problems appear to be increasing [11].
division is mainly based on complexity and duration of Hence, our goal is to present a modern and holistic
the activities. Due to the advancement in sensor and approach to addressing this problem by adopting state of
visual technology, HADR based systems have been the art digital surveillance and efficient machine learning
widely used in many real-world applications. algorithms. The rest of this paper, is structured as follows,
Specifically, the increase of small size sensors have in section II, literatures related to the works are presented in
enabled the smart devices to recognize the human brief, while in section III, methodology adopted for the
activities in a context-aware manner. proposed work is equally presented, and finally section IV
concludes the proposed study.
Hence, with HADR numerous application area we
propose a deep surveillance industrial scene human II. REVIEW OF RELATED WORKS
activity detection to fight against gas pipe-line
vandalizing, where, the recognition scheme can A number of research interest is drawn to the area of
effectively detect any suspicious activity and report via pipeline surveillance due to the economic importance of
sending a notification to the authorities for immediate pipelines as well as the health and safety implications of
action. pipeline incidents. Thus, Wireless-Sensor-Network (WSN)
has been identified and presented as a suitable solution for
Keywords:- Component; Real-Time Surveillance; Human addressing pipeline surveillance related problem via
Activity Recognition; KNN; Wireless Sensor Networks. sensing the environment and it is cost-effective. Asides
pipeline surveillance, other related applications domain for
WSN in oil and gas sector ranges from detecting leakage in
pipelines, monitoring tank level, Equipment Condition
Based Monitoring (CBM), Pipeline Pressure Relief Value
Monitoring (PRV), Refineries-Pressure-Relief-Value-
Monitoring (PRV) and Well-head-Automation and
Monitoring. However, most pipeline surveillance systems
are focused on leak detection [1]; [2], few pipeline

IJISRT19DEC608 www.ijisrt.com 1197


Volume 4, Issue 12, December – 2019 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
surveillance systems have tried to address threat detection III. METHODOLOGY
in pipelines. Sun and Wen [3] conducted a study on
pipeline threat detection and security, thereby developing a Deep surveillance system in industrial scene will be
pre-warning scheme for pipeline security using multi- made up of of three modules which include client module,
seismic sensors. Liang et. al [4] performed a risk application module and database server module. In the
assessment studies on pipelines based on malicious and client section, it will include an android based application
accidental threats. Furthermore, fault tree was used by the for receiving various notifications from the scene detection
authors to decide the risk assessment index, thereafter a scheme, such as anomaly event detection notification, this
self-organizing map scheme (SOM) was employed to will be receive only by authorized user. The Application
perform risk level classification on various section of the phase (module), will be made up of the core human activity
pipeline. An effective WSN based framework for integrated detection and recognition system. Whereas at the database
oil pipeline monitoring aimed at threat mitigation for end, a Google-server and apache tomcat local-server would
architectural model in pipelines is presented by Jawhar et be integrated to handle activity recognitions of the
al. [5] while, in Seema and Reisslein [6] a wire1ess-video- proposed scheme, for gas pipe-line vandalism, legal and
sensor node architecture scheme was developed - illegal industrial human activity scenario, dataset would be
(WVSNP). The hardware and software requirements for created at industrial environment. If actions like pipe-
WVSNP were discussed. Thus, various WSN models have vandalism or any illegal activity are detected by the system,
been developed, while the dynamic linear configuration it forwards a message signal to the user with registered and
model is identified to be as the more suitable for pipelines installed android based application as notification. Video
due to its linear nature Mohamed and Jawhar [7] and sequence sense from an industrial environment is taken as
Jawhar et. al [5]. Utilizing the present day technology, input to system, followed by performing grayscale
Wireless sensor networks having a wide range of conversion and various forms of pre-processing, then
applications. Hence, WSN used for intelligent feature extraction is performed using scale invariant feature
transportation system will relatively differ from those used transform (SIFT). The extracted features are used for action
for telemedicine and other services in various ways. WSN classification purpose. SVM and KNN classifiers are used
used for pipeline surveillance should be effective in for activity classification.
detecting leakages and threats to pipelines and localize such
events with certain degree of accuracy. In designing an Firebase cloud messaging (FCM) would be
effective WSN for pipeline surveillance system, three (3) incorporated in the developed deep surveillance industrial
key features are considered they consist of the following: scene human activity detection and recognition scheme for
adequate wireless mote, topology for deployment, and data sending notification to registered device. This service
mining technique [12]. Oil and gas pipelines by nature pass would be utilized for transferring a payload of up to about
through large geographical areas. Therefore, wireless motes 4KB to a client application using FCM for an instant
utilized for pipeline surveillance should employ power messaging to inform the client about the detected
optimization systems for the purpose of energy suspicious action and it location.
conservation while being able to transmit over a
considerable distance. In WSN these factors considered The outlined methodology would be carried out in the
during design depend on the specific task at hand even development of deep surveillance industrial scene human
though a lot of factors are generic for various tasks [12]. In activity recognition to mitigate vandalizing gas pipe-lines.
Boonjun et al [8] a real-time automatic object detection-  Data Collection
technique was developed using template-matching for  Pre-processing
pipeline protection, while in the work of Goel et al [ 9] an  Feature Extraction
on-line scheme for temporal detection of human daily-  Clustering and Classification
living activities using a long untrimmed video streams is  Pattern/template Matching
presented.  Activity Recognition

However the reviewed techniques did not employ any A. Data Collection
machine learning algorithm to train, classify and enable the Our video surveillance system would monitor the
system detect and even predict any vandalism and other environment (pipeline installation route) and capture
illegal activities before they occur. Our proposed system various forms of activities, behavior, or other changing
intends to address that challenge as the emphasis is on information, usually, of people from a distance by means of
prevention by developing a system that not only detects but sensing device. This is the first step towards prevention,
also predicts possible occurrence. reaction, detection, intervention. The data captured is
transmitted in real time to a base facility.

IJISRT19DEC608 www.ijisrt.com 1198


Volume 4, Issue 12, December – 2019 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165

Fig 1:- Hardware Setup for Data Collection

B. Pre-processing
It is critical to carry out the data processing on the Fig 2:- Block Diagram of Deep Surveillance Human
collected surveillance feed as the quality of the surveillance Activity Recognition System.
might be affected by weather, poor lighting signal
interference and so on. Some of the preprocessing activities IV. CONCLUSION
includes, compression, de-noising, segmentation,
equalization etc. The impacts of this research are numerous. Some of
the benefits are; prevention of pipeline vandalism,
C. Feature Extraction reduction in financial losses, alleviation of environmental
Feature extraction is carried out on the preprocessed degradation, security and safety, increased oil revenue
surveillance feed. First of all the background subtraction amongst. By adopting state-of-the-art surveillance devices
operation is done on the surveillance, then the feature of and a robust machine learning algorithm, the proposed
interest is extracted for clustering and classification. system would be able to completely solve the problem of
pipeline vandalism which poses a major threat to the
D. Clustering and Activity Classification operations and optimal yield of our oil and gas industry.
The Support-Vector-Machine-(SVM) and K-Nearest-
Neighbor (KNN) are the machine learning tools that would REFERENCES
be employed to cluster, classify and train the system based
on the collected surveillance dataset on different activities, [1]. T. AL-Kadi, Z. AL-Tuwaijri, and A. AL- Omran,
movements and positions etc. Unlike conventional “Wireless Sensor Networks for Leakage Detection in
approaches this technique would enable the system make Underground Pipelines: A Survey Paper,” 5th Int.
smart and intelligent inferences and predictions on possible Symp. Appl. Ad hoc Sens. Networks, vol. 21, no. 0,
threats even before they occur. Equation 1 shows the pp. 491–498, 2013.
mathematical model of KNN prediction. [2]. A. F. Colombo, P. Lee, and B. W. Karney, “A
selective literature review of transient-based leak
1
𝑌 = 𝐾 ∑𝑘𝑖=1 𝑦𝑖 (1) detection methods,” J. Hydro-Environment Res., vol.
2, no. 4, pp. 212–227, 2009.
[3]. J. Sun and J. Wen, “Research on Monitoring and Pre-
Here, yi is define as the ith case of the examples
warning System for Security of Pipelines Based on
sample and y denoted to be the prediction (outcome) of the
Multi-Seismic Sensors,” Int. Conf. Electron. Meas.
query point.
Instruments, pp. 1–5, 2009.
[4]. W. Liang, J. Hu, L. Zhang, C. Guo, and W. Lin,
E. Activity Recognition
“Assessing and classifying risk of pipeline third-party
Our system would track individual as they pass
interference based on fault tree and SOM,” Eng. Appl.
through the field of vision of the camera, and with machine
Artif. Intell., vol. 25, no. 3, pp. 594–608, Apr. 2012.
learning algorithms to classify the motion and activities of
[5]. I. Jawhar, N. Mohamed, and K. Shuaib, “A
every passerby that walks a stipulated radius to our pipeline
framework for pipeline infrastructure monitoring
infrastructure. The tracking is accomplished through the
using wireless sensor networks,” in Wireless
development of a position and velocity path characteristic.
Telecommunications Symposium, 2007. WTS 2007,
With this information, our system would report any threat
2007, pp. 1–7.
or suspected threat to the attention of human security
personnel.

IJISRT19DEC608 www.ijisrt.com 1199


Volume 4, Issue 12, December – 2019 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
[6]. A. Seema and M. Reisslein, “Towards Ef fi cient
Wireless Video Sensor Networks : A Survey of
Existing Node Architectures and Proposal for A Flexi-
WVSNP Design,” IEEE Commun. Surv. Tutorials,
vol. 13, pp. 462–486, 2011.
[7]. N. Mohamed and I. Jawhar, “A Fault Tolerant
Wired/Wireless Sensor Network Architecture for
Monitoring Pipeline Infrastructures,” in Sensor
Technologies and Applications, 2008.
SENSORCOMM ’08. Second International
Conference on, 2008, pp. 179–184.
[8]. Boonjun, K., Keeratipranon, N., & Chinpanthana, N.
(2018). Real time automatic object detection by using
template matching for protecting pipelines. Paper
presented at the 2018 International Workshop on
Advanced Image Technology (IWAIT).
[9]. Goel, A., Abubakr, A., Koperski, M., Bremond, F., &
Francesca, G. (2018). Online temporal detection of
daily-living human activities in long untrimmed video
streams. Paper presented at the 2018 IEEE
International Conference on Image Processing,
Applications and Systems (IPAS).
[10]. Udofia, O., & Joel, O. (2012). Pipeline vandalism in
Nigeria: Recommended best practice of checking the
menace. Paper presented at the Nigeria Annual
International Conference and Exhibition.
[11]. Kabir, A. (2016). Project-technological approach to
solve the crude oil theft, sabotage and pipeline
vandalization problem in Nigeria. Управление
проектами и развитие производства(4 (60)).
[12]. Eze, J., Nwagboso, C., & Georgakis, P. (2017).
Framework for integrated oil pipeline monitoring and
incident mitigation systems. Robotics and Computer-
Integrated Manufacturing, 47, 44-52.

IJISRT19DEC608 www.ijisrt.com 1200

S-ar putea să vă placă și